From ff83f41b4ad9080ed3ee7fb45225fc50099ccdfb Mon Sep 17 00:00:00 2001 From: Mike Salvatore Date: Tue, 14 Jun 2022 12:59:49 -0400 Subject: [PATCH] Agent: Remove disused run_mssql_command() --- monkey/infection_monkey/exploit/mssqlexec.py | 6 ------ 1 file changed, 6 deletions(-) diff --git a/monkey/infection_monkey/exploit/mssqlexec.py b/monkey/infection_monkey/exploit/mssqlexec.py index cb09c79fc..3dae07a21 100644 --- a/monkey/infection_monkey/exploit/mssqlexec.py +++ b/monkey/infection_monkey/exploit/mssqlexec.py @@ -107,12 +107,6 @@ class MSSQLExploiter(HostExploiter): mkdir_command = f"mkdir {MSSQLExploiter.TMP_DIR_PATH}" self._run_mssql_command(mkdir_command) - def run_mssql_command(self, mssql_command): - array_of_commands = mssql_command.split_into_array_of_smaller_payloads() - if not array_of_commands: - raise Exception("Couldn't execute MSSQL exploiter because payload was too long") - self.run_mssql_commands(array_of_commands) - def run_monkey(self, monkey_path_on_victim: PureWindowsPath): self._write_agent_launch_command_to_batch_file(monkey_path_on_victim) self.run_payload_file()